Skip to main content

Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes

  • Conference paper
  • First Online:
Information Theoretic Security (ICITS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8317))

Included in the following conference series:

Abstract

The contrast in visual cryptography has received a lot of attention. It has been studied using three different measures. In this paper we follow a measure-independent approach, which, by using the structural properties of the schemes, enables us to provide a characterization of optimal schemes that is independent of the specific measure used to assess the contrast. In particular we characterize and provide constructions of optimal schemes for the cases of \((2,n)\)-threshold and \((n,n)\)-threshold schemes. Then, we apply the measure-independent results to the three measures that have been used in the literature obtaining both new characterizations and constructions of optimal schemes and alternative proofs of known results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For deterministic visual cryptography it must be \(m\ge 2\), i.e., the pixel expansion is unavoidable. The probabilistic and the random grid visual cryptography models allow \(m=1\).

  2. 2.

    In a more general form, it is possible to consider access structures where there are some subsets that are neither qualified nor forbidden; in such a case we simply don’t care about what those subsets of participants can do with the shares.

  3. 3.

    The authors of [32] used two thresholds, \(\hat{\ell }\) and \(\hat{h}\), to measure the level of whiteness in the reconstruction of a white or a black pixel, while we use two thresholds, \(\ell \) (low) and \(h\) (high), to measure the level of blackness in the reconstruction of a white or a black pixel. In [21] the thresholds measure the level of blackness too, but are expressed as \(m-\hat{h}\) and \(m-\hat{\ell }\). In the first paper on visual cryptography [28] explicit thresholds \(\ell \) and \(h\) are not used, but the conditions are stated in terms of the level of blackness, too.

  4. 4.

    According to the measure \(\gamma _{\textsc {ns}}\) the contrast in both cases is the same.

  5. 5.

    We state the following theorem using the original contrast thresholds \(\hat{\ell }=m-h\), \(\hat{h}=m-\ell \) as they appear in the original paper.

References

  1. Adhikari, A., Sikdar, S.: A new (2, n)-visual threshold scheme for color images. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 148–161. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)

    Article  MATH  Google Scholar 

  3. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416–428. Springer, Heidelberg (1996)

    Google Scholar 

  4. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)

    Article  MATH  Google Scholar 

  5. Blundo, C., Cimato, S., De Santis, A.: Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369, 169–182 (2006)

    Article  MATH  Google Scholar 

  6. Blundo, C., D’Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math. 16, 224–261 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  7. Blundo, C., De Bonis, A., De Santis, A.: Improved schemes for visual cryptography. Des. Codes. Crypt. 24, 255–278 (2001)

    Article  MATH  Google Scholar 

  8. Blundo, C., De Santis, A.: Visual cryptography schemes with perfect reconstruction of black pixels. J. Comput. Graph. 22, 449–455 (1998)

    Article  Google Scholar 

  9. Blundo, C., De Santis, A., Stinson, D.R.: On the contrast in visual cryptography schemes. J. Cryptol. 12, 261–289 (1999)

    Article  MATH  Google Scholar 

  10. Chen, S.-K., Lin, S.-J.: Optimal \((2, n)\) and \((2,\infty )\) visual secret sharing by generalized random grids. J. Vis. Commun. Image Represent. 23, 677–684 (2012)

    Article  Google Scholar 

  11. Chen, T.-H., Tsao, K.-H.: Visual secret sharing revisited. Pattern Recogn. 42, 2203–2217 (2009)

    Article  MATH  Google Scholar 

  12. Chen, T.-H., Tsao, K.-H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)

    Article  Google Scholar 

  13. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 235–248. Springer, Heidelberg (2005)

    Google Scholar 

  14. Cimato, S., De Prisco, R., De Santis, A.: Optimal colored threshold visual cryptography schemes. Des. Codes. Crypt. 35, 311–335 (2005)

    Article  MATH  Google Scholar 

  15. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)

    Article  Google Scholar 

  16. Cimato, S., De Prisco, R., De Santis, A.: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1–3), 261–276 (2007)

    Article  MATH  Google Scholar 

  17. Cimato, S., Yang, C.-N. (eds.): Visual Cryptography and Secret Image Sharing. CRC Press, USA (2012). ISBN 978-1-4398-3721-4

    Google Scholar 

  18. De Prisco, R., De Santis, A.: Using colors to improve visual cryptography for black and white images. In: Fehr, S. (ed.) ICITS 2011. LNCS, vol. 6673, pp. 182–201. Springer, Heidelberg (2011)

    Google Scholar 

  19. De Prisco, R., De Santis, A., Color visual cryptography schemes for black and white secret images. Theor. Comput. Sci. http://dx.doi.org/10.1016/j.tcs.2013.09.005, to appear

  20. Hou, Y.-C.: Visual cryptography for color images. Pattern Recogn. 36, 1619–1629 (2003)

    Article  Google Scholar 

  21. Eisen, P.A., Stinson, D.R.: Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels. Des. Codes. Crypt. 25, 15–61 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  22. Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal \(k\) out of \(n\) secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240, 471–485 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  23. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  24. Krause, M., Simon, H.U.: Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb. Probab. Comput. 12, 285–299 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  25. Koga, H.: Proposal of a lattice-based visual secret sharing scheme for color and gray-scale images. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 81–A(6), 1262–1269 (1988)

    Google Scholar 

  26. Kuhlmann, C., Simon, H.U.: Construction of visual secret sharing schemes with almost optimal contrast. In: Proceedings of the 11th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, pp. 262–272, 9–11 January 2000

    Google Scholar 

  27. Lu, S., Manchala, D., Ostrovsky, R.: Visual cryptography on graphs. J. Comb. Optim. 21, 47–66 (2011)

    Article  MATH  Google Scholar 

  28. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  29. Shyu, S.-J.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)

    Article  MATH  Google Scholar 

  30. Shyu, S.-J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)

    Article  MATH  Google Scholar 

  31. Simon, H.U.: Perfect reconstruction of black pixels revisited. In: Liśkiewicz, M., Reischuk, R. (eds.) FCT 2005. LNCS, vol. 3623, pp. 221–232. Springer, Heidelberg (2005)

    Google Scholar 

  32. Verheul, E.R., van Tilborg, H.C.A.: Constructions and properties of \(k\) out of \(n\) visual secret. sharing schemes. Des. Codes. Crypt. 11, 179–196 (1997)

    Article  MATH  Google Scholar 

  33. Wang, R.-Z., Lan, Y.-C., Lee, Y.-K., Huang Shyu, S.J., Chia, T.L.: Incrementing visual cryptography using random grids. Opt. Commun. 283, 4242–4249 (2010)

    Article  Google Scholar 

  34. Yang, C.-N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25, 481–494 (2004)

    Article  Google Scholar 

  35. Yang, C.-N., Chen, T.-S.: Size-adjustable visual secret sharing schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88–A(9), 2471–2474 (2005)

    Article  Google Scholar 

  36. Yang, C.-N., Chen, T.-S.: Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recogn. Lett. 26, 193–206 (2005)

    Article  Google Scholar 

  37. Yang, C.N., Laih, C.-S.: New colored visual secret sharing schemes. Des. codes. crypt. 20, 325–335 (2000)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roberto De Prisco .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

D’Arco, P., De Prisco, R., De Santis, A. (2014). Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes. In: Padró, C. (eds) Information Theoretic Security. ICITS 2013. Lecture Notes in Computer Science(), vol 8317. Springer, Cham. https://doi.org/10.1007/978-3-319-04268-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04268-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04267-1

  • Online ISBN: 978-3-319-04268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics